Login / Signup

Applying security policies and service level agreement to IaaS service model to enhance security and transition.

Louay Karadsheh
Published in: Comput. Secur. (2012)
Keyphrases
  • security policies
  • security requirements
  • access control
  • real time
  • database
  • information systems
  • management system
  • context aware
  • service oriented
  • resource management
  • security management
  • rbac model